The Authoritative ID Store Is Dead-How Cloud Changes Provisioning

As IdM in the Enterprise evolved, all software programs from operating system, middleware, and applications as well as networking programs such as VPN converged on integrating with a single authoritative ID store based on LDAP protocol. The cloud is changing this as every SaaS application tries to maintain account information about users leading to emergence of multiple identity silos. On the other hand, many SaaS providers are eyeing identities they manage as business assets to create stickiness with their products and getting in the race of becoming authoritative identity provider themselves. These couple of scenarios are leading to new challenges to solve in the identity provisioning and synchronization space.

Join Intel & McAfee, along with special guest Andras Cser of Forrester Research, in this webinar to explore federated cloud account provisioning. You will learn:

•Compare and contrast internal provisioning with cloud use models
•Typical workflows and functions required for cloud provisioning
•Synchronization of id profiles and attributes- what needs to be done
•SaaS provider motivations related to id storage

Join Securosis analysts Adrian Lane and Gunnar Peterson as they discuss their new report, "API Gateways: Where Security Enables Innovation". This "speed round" style webinar will focus on API security best practices and will invite real world security questions from the audience. All attendees will receive a free copy of the report.

APIs are a hot topic in all sectors of IT - they have gone from being niche solutions provided by big players like Amazon and Google, to being almost as ubiquitous as corporate websites. Ad hoc API development & evangelism without a formal program can leave real revenue on the table, can unintentionally leak sensitive data, and can tarnish the corporate brand with the development community. Today, developers and partners expect to be engaged with first class API programs, while businesses expect real insights to know which APIs are profitable and which APIs to bring to market next. In this webinar, Intel & Mashery outline the baseline enterprise pillars for constructing a first class API program. Learn from CapitalOne how they strategized to build an API program grounded in core business objectives. All attendees to receive a new Mobile API Buyers Guide that presents how to optimize APIs for mobile apps.

As the Enterprise begins to expose application APIs as packaged products consumed by developer communities, partners, and mobile devices- they are also opening new threat vectors into their back end infrastructure. APIs include self documenting meta data that often mistakenly provides information on usage and connections that can be used for SQL injection or other content borne attacks. The application layer must deal with a wide range of protocols with potential threats… from XML/SOAP, REST/JSON, and OAuth/and API Keys used in application requests. In this webinar, we outline API best practice security measures such as encryption, SSL, key management, DLP, and schema validation. To scale deployment Intel showcases how an API Gateway combined with a portal managed service in the cloud can safely share APIs while tightly integrating cloud/on-prem applications.

In this product launch webinar, Intel & API Management magic quadrant leader Mashery discuss the market drivers that have created the need for enterprise class API management solutions that scale to thousands of developers and consumers. We showcase a new composite API platform solution available from Intel, that packages a cloud based API portal from Mashery for promotion, monitoring, and sharing of meta data to developer communities with the Intel gateway security & integration solution that exposes RESTful APIs for consumption at the network edge. The lifecycle for APIs will be discussed along with the typical separation of duties for API management within the enterprise: Service Administrators, Developers, and Architects. Tune in to learn how to package APIs as revenue generating products, safely expose back end applications, and drive usage with mobile consumers and developer communities.

HITEC and the Patient Protection & Affordable Care Act (PPACA) are fueling the requirement for, and subsequent growth of, interoperable systems in the US -- with a common thread between all the various initiatives being the use of SOA, mobile focused information exchange, and protecting patient data privacy.

In this webinar, Intel looks specifically at the Health Insurance Exchange (HIX) ecosystem and posits a "Service Gateway Reference Architecture" that incorporates legacy protocols, the workflows involved in information exchange, information delivery to mobile APIs, and PHI data protection. Maximus, a leader with programs in health and human services, that has partnered with state, local, and Federal government - discusses how to protect PHI for HIPAA compliance.

The issue with the predominant multi-tier data center application architecture is that it is designed with a browser in mind. Mobile Device Management and Web-only Firewalls do not address how to incorporate server side applications, legacy data, and identity infrastructure with the sea of heterogeneous mobile platforms, operating systems, and programming languages used today. We present how Service/API Gateway enables the mobile application economy via REST APIs with JSON and mobile friendly tokens such as OAuth. Finally we outline an end-to-end mobile enablement architecture to expose app data via APIs, advertise APIs to developers via a portal, and tools that make it easy for developers to use those APIs to create mobile apps.

Organizations need something stronger than a simple UserID/password logon to protect sensitive data in the cloud. Strong authentication is the industry standard for protecting personal, financial, healthcare or confidential corporate information. In this webinar, identity security experts from Intel/McAfee, Nordic Edge and BioID discuss the various types of multi-factor authentication that are available, and when, where and how they can be deployed to provide essential protections.

Over the past decade, Salesforce.com has evolved from a CRM destination to a suite of platforms that enable social enterprise collaboration. Now identity and access management are at the forefront of the latest capabilities enabled by Salesforce.com and its ISV partners Intel & McAfee. Not only can an enterprise enable seamless SSO access into Salesforce.com from corporate ID stores, they can manage access to any external SaaS app or up-level cloud provider authentication with multi-factor authentication, all managed 100% within the Salesforce platform.

In this webinar, Salesforce.com’s identity experts present their latest platform capabilities for cloud security & outline new areas of focus in federation standards, such as provisioning and support for mobile apps. Intel presents their experience in leveraging the Force.com platform to build their Identity-as-a-Service offering: Intel Cloud SSO - now available on AppExchange.

You will learn:

* How to enable seamless SSO into custom apps deployed on Force.com
* How to leverage resident Salesforce.com identities for cloud access
* How to implement SSO across large multi-org Salesforce.com hierarchies
* Mobile cloud SSO design patterns and emerging standards
* How to apply Multi-Factor Authentication for access to Salesforce or SaaS
* How to leverage Active Directory for access to external SaaS apps
* New Force.com cloud security capabilities

When securing credit card data, the imperative to be PCI DSS compliant remains a constant, while the actual solution implemented by merchants can vary depending on the size and nature of an organization. A solution for a small merchant with low transactions will differ from mid-sized retailers with a web presence…from a large merchant with POS & back-office payment infrastructure. Securosis.com’s expert PCI-DSS analyst Adrian Lane, dissects the deployment models with pros and cons of: on-prem vs outsourced models, proxy based tokenization, and format preserving encryption. Adrian covers base tokenization flows for newbies and reflects on detailed cost, pricing, & vendor lock-in concerns for deployments in progress. You will learn:

As organizations move to the Cloud, concerns arise about retaining control of data resident on third-party services. At the same time, distributing information and protecting intellectual property across a distributed, cloud-based supply chain is a business and IT concern, since there is a need for verifiable trust and persistent visibility into the flow of information. An emerging white space exists for the glue between identity logic, data properties, storage and key management in terms of defining, managing and enforcing policies across SaaS, cloud, mobile and hybrid environments. In this webinar we present the concepts and review solutions that are beginning to address this white space: the cloud service broker role, API/Service Gateways, & Identity as a Service.

Outsourcing identity management to the cloud allows you to reduce costs, improve productivity, strengthen security, and streamline IT operations.
Join us for a first look at Intel’s new identity as a service offering that simplifies the cumbersome process of providing users with access to hundreds of SaaS apps. We provide an overview of the multi-tenant platform architecture, strong auth security controls and unique configuration capabilities gained through our deployment on Force.com. Hear about first impressions from customers.
You will learn about:
•Benefits of outsourcing identity to the cloud
•How & when to incorporate corp id stores
•Cloud access scenarios where 2nd Factor Auth should be applied
•100% in cloud, on-prem, or hybrid- which is right for you?
•Decision criteria used by customers to choose IDaaS

As APIs enable organizations to extend their products into broad-based platforms and as applications are shared outside the protective firewall to/from the cloud and among cloud providers--Security, Governance, Control, and Managment of these APIs have never been more important. API Security necessarily deals with four major issues: Identity and Authentication, Access Control and Authorization, Input Validation, and Misconfiguration. As a follow on to the introductory Enterprise API Requirements webinar, this technical session will take a deep dive into Enterprise API Security including:

Employees love the convenience and utility of collaborative file sharing applications like Box.com. Sharing contracts, graphics/video files, or other corporate content using a cloud based service empowers users to share information directly with external partners-outside traditional enterprise security controls. You want to encourage productivity but you also need a strategy that addresses how you’re going to control access to file sharing applications and inspect data before it leaves the enterprise.

In this webinar Intel, McAfee and Box have joined forces to discuss how content can be protected throughout the collaboration lifecycle-from access and upload to download and distribution.

You will learn:
•Overview of typical file sharing use cases and workflows
•Streamlining access for users
•Tying federated authentication to corporate id stores
•Adding 2nd factor strong authentication for sensitive document sharing
•Blocking sensitive files from upload
•On-prem, 100% in the cloud, and hybrid implementation options
As a bonus, all attendees will be eligible to receive a free enterprise trial account from Box.

While APIs have been ubiquitous within the enterprise for many years, today they are emerging as the new enterprise control point for cloud applications. In the modern API economy, every enterprise with an Internet presence has an opportunity to expose APIs to third-party access, unlocking value in data and services that would otherwise be hidden behind monolithic legacy systems. While API management might be an old concept, cloud-based API management presents a new discipline with added security, visibility, integration, and scale requirements.

New approaches to identity and access management based on leveraging the powerful, elastic, and cost-effective cloud model are emerging. In this webinar, Dave Kearns, Sr. Analyst at KuppingerCole, will discuss the benefits and challenges of moving use identities to the cloud. Vikas Jain, Director of Product Management at Intel, will follow with an overview of Intel Cloud SSO, Intel’s newest identity and security solution for the cloud.

The recommended cloud security stack, standards, and operating frameworks have rapidly evolved into a set of production quality best practices for the Enterprise as they engage each cloud provider. However, as scale is applied, managing 1-n cloud relationships and services across hybrid environments points to a brokered or intermediary model to solve integration/security complexity, aggregate services, & add new value. This is not new- B2B EDI evolved much the same way from point-to-point, to IT department managed gateway VANs, to 3rd party industry B2B exchanges. Join this webinar to prepare your organization for Cloud Service Brokerage - Gartnerâs Daryl C. Plummer has forecast this as âthe biggest growth area for cloud computing.â

Application security & analytics software that help enable the Hybrid Enterprise model where data and apps are deployed across on-prem and cloud environments. Transform how services & sensitive data are exposed as APIs to developers/mobile, aggregate and analyze corporate data for new insights, and ensure data level security and compliance.